Most federal agency employees with iPhones probably don't have to worry about hackers ogling naked photos of them saved in Apple’s iCloud backup system.

But they might have cause for concern about attackers targeting the cloud service to peer at sensitive government information, cybersecurity experts warn.

The problem, experts say, is a lack of awareness. iCloud, by default, automatically backs up a user’s device over Wi-Fi every day, according to Apple's website.

Federal employees could be uploading sensitive information when they work on their personally owned iPhones -- unless agencies take action. And it is not clear that they are.

"Most people have no concept that the data goes out to different places," said Kevin Johnson, CEO of Secure Ideas, a company that tests federal systems for security holes.

The concerns, however, appear to be largely limited to employees’ personal devices. The federal agencies contacted by Nextgov said they blocked access to iCloud on government-owned devices -- and even some personal devices -- as a matter of agency policy.

Concerns Not Limited to Apple

Over the weekend, cybercrooks allegedly snatched explicit photos from the iCloud accounts of dozens of female celebrities, including Oscar winner Jennifer Lawrence, and dumped some of them online. Whether this was done through a bug in Apple's infrastructure, surveillance software, cracking each celeb’s password or a combination of the above is unclear.

But if federal employees don’t know to disable the service, iCloud could potentially save the GPS coordinates of undisclosed federal facilities, wireless device configurations, work documents an employee wants to work on at home and office photos, among other things.

Those worries aren’t limited to Apple.

"Some Android phones automatically sync to [cloud storage site] Dropbox, which is even more of a concern because Dropbox is designed to be used for any file type, whereas iCloud is for specific types," Johnson said.

Jerry Irvine, a member of the National Cyber Security Partnership, a public-private organization, said personal devices synced to iCloud or any other uncontrolled third-party cloud certainly present a threat to the government.

The "phone itself is connected to the agency's network and the iCloud," he said. "If a federal employee or a consultant is allowed to bring their personal iPhone into the work environment, that is a potential risk."

Irvine, who consults for state and local agencies, added: “They could send emails. They could see emails. All of that could be saved to the cloud without knowledge of the federal government.”

"GSA does not allow document-sync to iCloud," agency spokeswoman Jackeline Stewart said in an email.

NASA spokesman Allard Beutel told Nextgov "iCloud is not approved" for storing and processing NASA data, regardless of whether it’s used on a NASA-owned or a BYOD device. Space agency officials were unable to immediately comment on how they enforce the ban.

As news of the hack surfaced, security researchers described a method for exploiting an iCloud weakness -- nicknamed iBrute, for "brute force" -- that allowed infiltrators to test tons of password attempts without locking the account. Apple released a patch for the vulnerability shortly afterward.

On Monday, Apple denied the security of the iCloud system was responsible for the breach. An investigation into the incident is still ongoing.

"We have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions," the company said in a statement. "None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud.”

FROM OUR SPONSORS

sponsored

JOIN THE DISCUSSION

By using this service you agree not to post material that is obscene, harassing, defamatory, or
otherwise objectionable. Although Nextgov does not monitor comments posted to this site (and has
no obligation to), it reserves the right to delete, edit, or move any material that it deems to
be in violation of this rule.

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

Data-Centric Security vs. Database-Level Security

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.